CN114333098B - Night patrol method, night patrol device, electronic equipment and computer readable medium - Google Patents

Night patrol method, night patrol device, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN114333098B
CN114333098B CN202111615906.0A CN202111615906A CN114333098B CN 114333098 B CN114333098 B CN 114333098B CN 202111615906 A CN202111615906 A CN 202111615906A CN 114333098 B CN114333098 B CN 114333098B
Authority
CN
China
Prior art keywords
patrol
authentication
personnel
plan
route
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111615906.0A
Other languages
Chinese (zh)
Other versions
CN114333098A (en
Inventor
李坚明
薛红星
谭世殊
蔡跃进
廖敏飞
温忠源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202111615906.0A priority Critical patent/CN114333098B/en
Publication of CN114333098A publication Critical patent/CN114333098A/en
Application granted granted Critical
Publication of CN114333098B publication Critical patent/CN114333098B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A90/00Technologies having an indirect contribution to adaptation to climate change
    • Y02A90/10Information and communication technologies [ICT] supporting adaptation to climate change, e.g. for weather forecasting or climate simulation

Abstract

The invention discloses a night patrol method, a night patrol device, electronic equipment and a computer readable medium, and relates to the technical field of sensing technology service of the Internet of things. One embodiment of the method comprises the following steps: invoking a patrol plan generating engine to enable the patrol plan generating engine to generate a patrol plan according to the set patrol elements; the patrol plan is used for indicating a patrol route, a patrol point and a combined authentication mode of a patrol personnel for carrying out patrol and card punching at the patrol time; sending the patrol plan to a terminal of a patrol personnel, so that the patrol personnel can carry out patrol and card punching on a patrol point by using an authentication factor appointed by a combined authentication mode according to a patrol route in the patrol time; and receiving a patrol and punch card request, carrying out trusted identity authentication on authentication information corresponding to the patrol point carried by the patrol and punch card request, and determining that patrol personnel finish patrol and punch card of the patrol point after the authentication is passed. The method can effectively prevent the phenomenon of card punching of the patrol agent and simultaneously protect the identity information of the patrol personnel.

Description

Night patrol method, night patrol device, electronic equipment and computer readable medium
Technical Field
The invention relates to the technical field of sensing technology service of the Internet of things, in particular to a night patrol method, a night patrol device, electronic equipment and a computer readable medium.
Background
The patrol refers to that patrol personnel patrol each patrol point according to a preset patrol route, and meanwhile, the safety of the patrol personnel is also protected. Most of the current patrol modes adopt patrol bars, RFID (Radio Frequency Identification ) tags, fingerprints, identity cards and other mediums to carry out patrol, and the patrol route is completed by using portable mediums to carry out card punching in the patrol process.
The night patrol mode relies on the medium to punch cards at all night patrol points, the identity of night patrol personnel is not verified, and the modern night patrol situation is easy to occur; in addition, the patrol mode using the identity card as a medium needs to read the identity card information, which may cause the leakage of the identity information of the patrol personnel, and in addition, the patrol task cannot be completed under the condition that the identity card is lost.
Disclosure of Invention
In view of the above, embodiments of the present invention provide a patrol method, apparatus, electronic device, and computer readable medium, where a combined authentication method for each patrol point of a patrol person on a patrol route is formulated in a patrol plan, so that when a patrol request of the patrol person is received, trusted identity authentication is performed for the patrol person based on authentication information corresponding to the combined authentication method, which can effectively prevent a phenomenon of patrol instead of card punching, and meanwhile, the identity information of the patrol person is protected.
In order to achieve the above object, according to an aspect of the embodiments of the present invention, there is provided a patrol method based on trusted identity authentication.
The patrol method based on the trusted identity authentication provided by the embodiment of the invention comprises the following steps: invoking a patrol plan generating engine to enable the patrol plan generating engine to generate a patrol plan according to the set patrol elements; the patrol elements comprise weather and working days, and the patrol plan is used for indicating patrol personnel to carry out a patrol route, patrol points and corresponding combined authentication modes of patrol and card punching at the patrol time according to the weather of the patrol time and whether the patrol time belongs to the working days;
sending the patrol plan to a terminal of the patrol personnel, so that the patrol personnel can carry out patrol and card punching on the patrol points by using the authentication factors specified by the combined authentication mode according to the patrol route in the patrol time;
and receiving a patrol and punch card request from the punch card equipment, performing trusted identity authentication on authentication information corresponding to the patrol point carried by the patrol and punch card request, and determining that the patrol personnel completes the patrol and punch card of the patrol point after the authentication is passed.
Optionally, the patrol element further includes: the patrol personnel, the patrol route, the patrol time, the patrol point and the combination authentication mode corresponding to the patrol point;
generating a patrol plan according to the set patrol elements comprises the following steps:
setting the patrol time for the patrol personnel to carry out patrol and card punching at the patrol point;
and setting a patrol route for the patrol personnel and a combination authentication mode of patrol points on the patrol route according to the weather of the patrol time and whether the patrol time belongs to a working day.
Optionally, the setting a patrol route for the patrol personnel includes:
dividing a plurality of patrol points according to the fact that the patrol points belong to an internal office area, an internal non-office area or an external area, so as to obtain a corresponding patrol point set;
determining that the patrol time is a working day and is a first target weather, planning a patrol route which does not affect office work for a patrol point set belonging to the internal office area, and respectively planning the shortest patrol route for the patrol point sets belonging to the internal non-office area and the external area;
if the patrol time is determined to be a working day and is a second target weather, planning the patrol route which does not affect office work for the patrol point set belonging to the internal office area, planning the shortest patrol route for the patrol point set belonging to the internal non-office area, and setting the patrol state of the patrol point set belonging to the external area as a card-punched state;
And if the patrol time is determined to be a non-working day, respectively planning the shortest patrol route for a plurality of patrol point sets.
Optionally, the performing trusted identity authentication on authentication information corresponding to the patrol point carried by the patrol and punch card request includes:
invoking a trusted identity authentication interface to perform trusted identity authentication on authentication information corresponding to a patrol point carried by the patrol card punching request;
in the trusted identity authentication process, one or more modes of living body detection technology, encryption technology, IP address and physical address control are used for preventing attacks.
Optionally, the method further comprises:
calling the patrol plan generating engine to enable the patrol plan generating engine to generate a corresponding patrol plan according to the set burst scene; the patrol plan is used for indicating a processing flow for the patrol personnel under the condition that the burst scene occurs.
Optionally, the method further comprises:
recording the patrol progress of the patrol personnel in real time and recording the identity authentication record of the patrol personnel on the patrol points of the patrol route;
and carrying out patrol analysis according to the patrol progress and the identity authentication record.
Optionally, the combined authentication mode is any one or more of the following combinations of authentication factors: biological information, dynamic two-dimensional codes, trusted identity passwords and dynamic verification codes.
In order to achieve the above object, according to another aspect of the embodiments of the present invention, there is provided a patrol apparatus based on trusted identity authentication.
The invention provides a patrol device based on trusted identity authentication, which comprises: the system comprises a plan generation module, a patrol plan generation module and a control module, wherein the plan generation module is used for calling a patrol plan generation engine so that the patrol plan generation engine generates a patrol plan according to set patrol elements; the patrol elements comprise weather and working days, and the patrol plan is used for indicating patrol personnel to carry out a patrol route, patrol points and corresponding combined authentication modes of patrol and card punching at the patrol time according to the weather of the patrol time and whether the patrol time belongs to the working days;
the plan sending module is used for sending the patrol plan to the terminal of the patrol personnel so that the patrol personnel can carry out patrol and card punching on the patrol points by using the authentication factors appointed by the combined authentication mode according to the patrol route in the patrol time;
The authentication card punching module is used for receiving a patrol card punching request from card punching equipment, carrying out trusted identity authentication on authentication information corresponding to a patrol point carried by the patrol card punching request, and determining that patrol personnel finish patrol card punching of the patrol point after the authentication is passed.
Optionally, the patrol element further includes: the patrol personnel, the patrol route, the patrol time, the patrol point and the combination authentication mode corresponding to the patrol point;
the plan generating module is also used for setting the patrol time for the patrol personnel to carry out patrol and card punching at the patrol point; and
and setting a patrol route for the patrol personnel and a combination authentication mode of patrol points on the patrol route according to the weather of the patrol time and whether the patrol time belongs to a working day.
Optionally, the plan generating module is further configured to
Dividing a plurality of patrol points according to the fact that the patrol points belong to an internal office area, an internal non-office area or an external area, so as to obtain a corresponding patrol point set;
determining that the patrol time is a working day and is a first target weather, planning a patrol route which does not affect office work for a patrol point set belonging to the internal office area, and respectively planning the shortest patrol route for the patrol point sets belonging to the internal non-office area and the external area;
If the patrol time is determined to be a working day and is a second target weather, planning the patrol route which does not affect office work for the patrol point set belonging to the internal office area, planning the shortest patrol route for the patrol point set belonging to the internal non-office area, and setting the patrol state of the patrol point set belonging to the external area as a card-punched state; and
and if the patrol time is determined to be a non-working day, respectively planning the shortest patrol route for a plurality of patrol point sets.
Optionally, the authentication card punching module is further used for
Invoking a trusted identity authentication interface to perform trusted identity authentication on authentication information corresponding to a patrol point carried by the patrol card punching request;
in the trusted identity authentication process, one or more modes of living body detection technology, encryption technology, IP address and physical address control are used for preventing attacks.
Optionally, the apparatus further comprises:
the plan generation module is used for calling the patrol plan generation engine so that the patrol plan generation engine generates a corresponding patrol plan according to the set burst scene; the patrol plan is used for indicating a processing flow for the patrol personnel under the condition that the burst scene occurs.
Optionally, the apparatus further comprises:
the patrol analysis module is used for recording the patrol progress of the patrol personnel in real time and the identity authentication record of the patrol personnel on the patrol point of the patrol route;
and carrying out patrol analysis according to the patrol progress and the identity authentication record.
Optionally, the combined authentication mode is any one or more of the following combinations of authentication factors: biological information, dynamic two-dimensional codes, trusted identity passwords and dynamic verification codes.
To achieve the above object, according to still another aspect of the embodiments of the present invention, there is provided an electronic device.
An electronic device according to an embodiment of the present invention includes: one or more processors; and the storage device is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors are enabled to realize the patrol method based on the trusted identity authentication.
To achieve the above object, according to still another aspect of the embodiments of the present invention, there is provided a computer-readable medium.
The embodiment of the invention relates to a computer readable medium, on which a computer program is stored, which when being executed by a processor, realizes the patrol method based on the trusted identity authentication.
To achieve the above object, according to still another aspect of embodiments of the present invention, there is provided a computer program product.
The computer program product of the embodiment of the invention comprises a computer program, and the program is executed by a processor to realize the patrol method based on the trusted identity authentication of the embodiment of the invention.
One embodiment of the above invention has the following advantages or benefits: by means of weather based on the patrol time in the patrol plan, whether the patrol time belongs to a working day, and a combined authentication mode of each patrol point on the patrol route, the patrol personnel can be trusted in identity authentication based on authentication information corresponding to the combined authentication mode when a patrol card-punching request of the patrol personnel is received, the phenomenon of card punching of the patrol personnel can be effectively prevented, and meanwhile, the identity information of the patrol personnel is protected.
Based on patrol personnel, patrol route, patrol time, patrol points, a plurality of patrol elements such as combination authentication modes corresponding to the patrol points, a patrol plan is formulated, different identity authentication modes are supported to different patrol points, and the patrol plan is more reasonable and has good flexibility. When the patrol plan is formulated, a plurality of patrol elements such as weather, workdays and the like are considered, so that the patrol route is ensured not to influence the office of office staff, and the patrol of the patrol staff is facilitated.
Through using various technical means to conduct anti-blackness management in the trusted identity authentication process, hacking is effectively prevented. By generating the patrol plan for the burst scene, the patrol personnel can process according to the patrol plan at the first time, and the coping capacity of the patrol personnel for coping with the burst scene is improved. By collecting patrol data and analyzing the patrol data, the patrol situation of patrol personnel can be conveniently known, and subsequent patrol tasks can be guided. The trusted identity authentication supports multiple modes and has good flexibility.
Further effects of the above-described non-conventional alternatives are described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
fig. 1 is a schematic diagram of main steps of a patrol method based on trusted identity authentication according to a first embodiment of the present invention;
fig. 2 is a schematic diagram of a patrol process based on trusted identity authentication according to a second embodiment of the present invention;
fig. 3 is a schematic diagram of the main flow of a patrol method based on trusted identity authentication according to the second embodiment of the present invention;
fig. 4 is a schematic diagram of the main flow of a patrol method based on trusted identity authentication according to the third embodiment of the present invention;
FIG. 5 is a schematic diagram of the main modules of a patrol apparatus based on trusted identity authentication according to an embodiment of the present invention;
FIG. 6 is an exemplary system architecture diagram in which embodiments of the present invention may be applied;
fig. 7 is a schematic diagram of a computer system suitable for use in implementing an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, in which various details of the embodiments of the present invention are included to facilitate understanding, and are to be considered merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
The data acquisition, storage, use, processing and the like in the technical scheme meet the relevant regulations of national laws and regulations.
Example 1
Fig. 1 is a schematic diagram of main steps of a patrol method based on trusted identity authentication according to a first embodiment of the present invention. As shown in fig. 1, the patrol method based on trusted identity authentication according to the first embodiment of the present invention is implemented by a patrol device based on trusted identity authentication, and mainly includes the following steps:
Step S101: and calling a patrol plan generating engine to enable the patrol plan generating engine to generate a patrol plan according to the set patrol elements. The patrol element comprises patrol personnel, a patrol route, patrol time, patrol points and a combination authentication mode corresponding to the patrol points, and further comprises any one or more of weather and working days. The patrol plan is used for indicating patrol personnel to carry out a patrol route, a patrol point and a corresponding combined authentication mode for carrying out patrol and card punching at the patrol time according to weather of the patrol time and whether the patrol time belongs to working days.
The combined authentication mode can be any one or a combination of a plurality of authentication factors: biological information, two-dimensional codes, trusted identity passwords and verification codes. The biometric information may be facial information, fingerprint information, iris information, etc. The two-dimensional code and the verification code are both codes which are sent to a terminal used by a patrol personnel by the patrol device and used for identity authentication, and are preferably dynamic two-dimensional codes and dynamic verification codes so as to further prevent the phenomenon of card punching. The trusted identity password is a password set by a user for the online copy of the identity card on the trusted identity authentication service platform.
In an embodiment, the patrol plan generating engine can set the patrol time for the patrol personnel to carry out patrol and card punching at the patrol point according to the information of the age, sex, duty time and the like of the patrol personnel, and then set the patrol route for the patrol personnel based on the weather of the patrol time and whether the patrol time belongs to working days, and the patrol time for carrying out patrol and card punching at the patrol point by using a combined authentication mode of each patrol point on the patrol route to obtain the patrol plan.
Step S102: and sending the patrol plan to a terminal of the patrol personnel, so that the patrol personnel can carry out patrol and card punching on the patrol points by using the authentication factors specified by the combined authentication mode according to the patrol route in the patrol time. And the patrol device generates a patrol plan for the patrol personnel and sends the patrol plan to the terminal of the patrol personnel. After receiving the patrol plan, the patrol personnel carry out patrol and card punching through the card punching equipment according to the patrol time, the patrol route and the authentication factors corresponding to the combined authentication modes arranged on each patrol point position specified by the patrol plan. The card punching equipment collects authentication information, generates a patrol card punching request and sends the patrol card punching request to the patrol device.
Step S103: and receiving a patrol and punch card request from the punch card equipment, performing trusted identity authentication on authentication information corresponding to the patrol point carried by the patrol and punch card request, and determining that the patrol personnel completes patrol and punch card after the authentication is passed. The patrol and punch card request comprises a patrol route, a patrol point position and authentication information, wherein the patrol route is requested to punch card by a patrol person, the patrol device performs trusted identity authentication on the corresponding authentication information according to a combined authentication mode set for the patrol point position, and after authentication, the patrol and punch card of the patrol point position is determined to be completed by the patrol person.
The trusted identity authentication is based on a second-generation identity card and an outbound certificate. The trusted identity authentication requires that the patrol personnel can use the patrol personnel only after checking, and in the process of checking the patrol, the validity of identity checking is ensured by freely designating an authentication factor for carrying out the identity authentication, so that the problem of checking the patrol personnel instead of the patrol is solved. Meanwhile, the trusted identity authentication is desensitized at the front end, and identity information of patrol personnel can be protected on the premise of background real-name authentication only by using a two-dimensional code or an encrypted electronic file as a medium.
Example two
Fig. 2 is a schematic diagram of a patrol process based on trusted identity authentication according to a second embodiment of the present invention. As shown in fig. 2, the patrol process based on trusted identity authentication in the second embodiment of the present invention is: and the patrol personnel performs combined authentication of corresponding authentication factors (such as face brushing, dynamic two-dimensional codes, password input, dynamic verification codes and the like) on each patrol point according to the patrol route in the patrol time according to the patrol plan, and sends authentication information to a patrol device based on trusted identity authentication.
The patrol device performs trusted identity authentication on the authentication information to ensure the validity, the safety and the accuracy of the identity authentication, and records video pictures of the patrol personnel for on-site patrol and card punching. The manager of the patrol device can check the patrol progress of the patrol person and retrieve the monitoring video picture of the patrol point in real time through the patrol device, so that the manager can conveniently check and check.
Fig. 3 is a schematic diagram of a main flow of a patrol method based on trusted identity authentication according to a second embodiment of the present invention. As shown in fig. 3, the patrol method based on trusted identity authentication in the second embodiment of the present invention is implemented by a patrol device based on trusted identity authentication, and mainly includes the following steps:
Step S301: the patrol device acquires patrol management information. The manager manages the patrol personnel, the patrol route, the patrol time, the patrol plan and the like on a management page of the patrol device. The management of the patrol personnel mainly comprises the management of the patrol personnel on duty every day, including the names, the sexes, the time on duty and the like of the patrol personnel.
The management of the patrol route mainly comprises determining patrol points (such as a certain point in an office building and a certain point outside the office building) which are required to be reached by patrol personnel every day, and card punching equipment (such as a camera, a face brushing plate machine, a fingerprint machine and the like) of each patrol point, wherein the combination authentication modes are supported by different patrol points.
The management of the patrol time mainly manages the time of the patrol card in the patrol area, for example, the card is required to be punched at the L1 place at the T1 time, the card is required to be punched at the L2 place at the T2 time, and the like.
The patrol plan refers to a pre-established countermeasure for a sudden scene possibly occurring in the patrol process. Burst scenes may include fires, people gathering, motion sickness, and the like. For example, in order to cope with a sudden scene of fire or open fire, the positions of fire extinguishers placed at various patrol points in a patrol area and a use method need to be marked in advance, and in the patrol process, if a patrol person encounters a fire early warning at a certain position in the patrol area, the fire early warning can be processed according to instructions in a patrol plan at the first time.
The management personnel operate the management contents of the patrol personnel, the patrol route, the patrol time and the patrol plan on the management page to form patrol management information.
Step S302: the patrol device calls a patrol plan generating engine so that the patrol plan generating engine generates a patrol plan and a patrol plan according to the patrol management information and sends the patrol plan and the patrol plan to a terminal of a patrol person. When the patrol plan is generated, the patrol plan generating engine generates the patrol plan after comprehensive analysis according to patrol personnel, a patrol route, patrol time, patrol points, patrol elements such as a combination authentication mode corresponding to the patrol points, weather, workdays and the like. The patrol plan comprises a patrol route, patrol points and corresponding combined authentication modes, wherein patrol personnel need to carry out patrol and card punching at each patrol time.
Specifically, according to the patrol management information, a patrol route is set for a patrol personnel, a combination authentication mode of each patrol point on the patrol route, and patrol time for carrying out patrol and card punching on the patrol point is set, so that a patrol plan is generated.
When a patrol route is set, a plurality of patrol points are divided according to the fact that the patrol points belong to an internal office area, an internal non-office area or an external area, and a corresponding patrol point set is obtained. The internal office area refers to an outdoor office area in a patrol area, such as an office area in an office building; the internal non-office area refers to a non-open non-office area in a patrol area, such as a non-office area in an office building; the outside area refers to an area in the open air in a patrol area, such as an area outside an office building. The above processing divides the patrol points into three classes, and places the patrol points belonging to the same class in one patrol point set.
And then planning a patrol route according to whether the patrol time is a working day or not and the weather condition of the day. Specifically, if the patrol time is a workday and is the first target weather, one or more patrol routes which do not affect the office are planned for the patrol point set belonging to the internal office area, and the shortest patrol routes are respectively planned for the patrol point sets belonging to the internal non-office area and the external area. The first target weather is weather which does not affect patrol of patrol staff in an external area, such as sunny days, cloudy days and the like.
If the patrol time is workday and is the second target weather, one or more patrol routes which do not affect office work are planned for the patrol point set belonging to the internal office area, the shortest patrol route is planned for the patrol point set belonging to the internal non-office area, and the patrol state of the patrol point set belonging to the external area is set to be punched. The second target weather is weather affecting patrol of patrol staff in the external area, such as rainy days, snowy days and the like.
If the patrol time is a non-working day (such as holiday and holiday), the shortest patrol route can be respectively planned for all patrol point sets. Or further considering the weather condition, when the weather of the patrol time is the second target weather, only planning the shortest patrol route for the patrol point set belonging to the internal office area and the patrol point set belonging to the internal non-office area, and setting the patrol state of the patrol point set belonging to the external area as the checked card.
In the embodiment, the night-time weather condition can be considered independently to plan the night-time route. Specifically, if the patrol time is the first target weather, the shortest patrol route may be respectively planned for all patrol point sets. If the patrol time is the second target weather, the shortest patrol route can be planned for the patrol point set belonging to the internal office area and the patrol point set belonging to the internal non-office area, and the patrol state of the patrol point set belonging to the external area is set as the checked card.
The processing enables patrol personnel to conveniently patrol and not influence office area office workers when patrol, and meanwhile, patrol time weather is that patrol points in the outer area are together patrol and card-punching when second target weather is achieved, so that inconvenience caused by the fact that the patrol points in the outer area are affected by weather and walk back and forth in the inner area is avoided.
When a patrol plan is generated, calling a patrol plan generating engine to enable the patrol plan generating engine to generate a corresponding patrol plan according to a set burst scene; the patrol plan is used for indicating a processing flow for patrol personnel under the condition of burst scene. For example, if the sudden scene is a fire, the patrol plan includes the positions of fire extinguishers placed at each patrol point and the use method.
Step S303: when the terminal receives an opening instruction from the patrol personnel, a corresponding patrol plan and/or patrol plan is displayed on the user interface. And the patrol personnel uses the authentication factors appointed by the combined authentication mode to carry out patrol and card punching on the patrol points according to the patrol route and the patrol time and the patrol schedule. In the case of a sudden scene, the patrol personnel can process according to the indication of the patrol plan at the first time.
Step S304: the card punching equipment collects authentication information of the patrol personnel for carrying out patrol and card punching at the patrol point, generates a patrol and card punching request according to the authentication information and sends the patrol and card punching request to the patrol device. The card punching equipment can be a terminal used by a patrol person, and can also be a camera, a face brushing plate machine, a fingerprint machine and the like which are arranged at the patrol point. The authentication information is generated when the patrol personnel authenticates the corresponding authentication factors according to the combination authentication mode of the patrol points appointed in the patrol plan. For example, if the combined authentication mode includes face brushing and dynamic verification codes, the authentication information includes face information of the patrol personnel and the dynamic verification codes.
After the certification information is collected, the card punching equipment combines the patrol route and the patrol point position of the patrol personnel to generate a corresponding patrol card punching request and send the corresponding patrol card punching request to the patrol device.
Step S305: the patrol device performs trusted identity authentication on authentication information corresponding to the patrol point carried by the patrol card punching request, and after the authentication is passed, it is determined that patrol personnel finish the patrol card punching of the patrol point. The patrol device calls a trusted identity authentication interface to perform trusted identity authentication on authentication information corresponding to the patrol point carried by the patrol card punching request.
In the trusted identity authentication process, one or more of living detection technology, encryption technology, IP address and physical address control can be used to prevent malicious attacks. The living body detection technology is used for preventing patrol personnel from authenticating by using photos or fake faces, and the encryption technology is used for preventing data from being tampered.
Example III
Fig. 4 is a schematic diagram of the main flow of a patrol method based on trusted identity authentication according to the third embodiment of the present invention. As shown in fig. 4, the patrol method based on trusted identity authentication in the third embodiment of the present invention is implemented by a patrol device based on trusted identity authentication, and mainly includes the following steps:
step S401: the patrol device acquires patrol management information. The specific implementation of this step is shown in step S301, and will not be described here.
Step S402: the patrol device calls a patrol plan generating engine so that the patrol plan generating engine generates a patrol plan and patrol plans of different burst scenes according to the patrol management information and sends the patrol plan and the patrol plans to a terminal of a patrol person. The specific implementation of this step is shown in step S302, and will not be described here.
Step S403: and the terminal receives the patrol plan and the patrol plans of different burst scenes.
Step S404: when the terminal receives a plan opening instruction from the patrol personnel, a corresponding patrol plan is displayed on a user interface, so that the patrol personnel can carry out patrol and card punching according to the patrol plan. The patrol personnel opens the patrol plan through the terminal so as to carry out patrol and card punching on the patrol points according to the patrol route and the specified authentication factors of the combined authentication mode in the patrol time based on the patrol plan.
Step S405: in the process of punching cards, when a terminal receives a plan opening instruction from a patrol personnel, a corresponding patrol plan is displayed on a user interface, so that the patrol personnel processes a burst scene according to the patrol plan, and after the processing is finished, relevant information of the burst scene is uploaded and the patrol and punching cards are continued. In the process of patrol and card punching, patrol personnel find that a sudden scene, such as a fire disaster, occurs in a patrol area, and then open a patrol plan corresponding to the sudden scene of the fire disaster through a terminal so as to take out a fire extinguisher from a specified position for fire extinguishing treatment according to the indication of the patrol plan.
After the fire extinguishing is finished, the related information of the burst scene is recorded, wherein the related information can comprise the time for finding the fire, the fire processing information, the processing finishing time, the property loss condition, the casualties condition and the like, and the recorded content is uploaded to a patrol device. Meanwhile, after the fire extinguishment is finished, the night patrol and card punching of the night patrol point position can be continued.
Step S406: and the patrol device receives and records the related information of the burst scene. The record can be used for further perfecting the patrol plan subsequently, and can also manage the patrol state of the patrol personnel based on the time for finding the fire and the processing ending time, for example, the patrol state of the patrol point is set to be the checked card, so that the failure of checking the card caused by the conditions of delayed card checking, non-card checking and the like caused by processing the burst scene of the patrol personnel is avoided.
Step S407: the card punching equipment collects authentication information of the patrol personnel for carrying out patrol and card punching at the patrol point, generates a patrol and card punching request according to the authentication information and sends the patrol and card punching request to the patrol device. The specific implementation of this step is shown in step S304, and will not be described here.
Step S408: the patrol device performs trusted identity authentication on authentication information corresponding to the patrol point carried by the patrol card punching request, and after the authentication is passed, it is determined that patrol personnel finish the patrol card punching of the patrol point. The specific implementation of this step is shown in step S305, and will not be described here.
In an alternative embodiment, the patrol progress of the patrol personnel and the identity authentication record of the patrol personnel on the patrol point of the patrol route can also be recorded in real time; and then carrying out patrol analysis according to the patrol progress and the identity authentication record. Through the recording operation, the manager can check the current patrol progress in real time and the identity authentication record of each patrol point on the patrol route.
In another alternative embodiment, patrol data may also be obtained, and patrol analysis may be performed on the patrol data. The patrol data may include a patrol progress and an identity authentication record. The patrol analysis can analyze the patrol plan completion situation, the patrol route statistics, the patrol completion degree, the identity authentication situation of each patrol point, the patrol completion situation (such as patrol duration and patrol point number) of each patrol personnel, and the like.
Fig. 5 is a schematic diagram of main modules of a patrol device based on trusted identity authentication according to an embodiment of the present invention. As shown in fig. 5, a patrol device 500 based on trusted identity authentication according to an embodiment of the present invention mainly includes:
the plan generating module 501 is configured to call a patrol plan generating engine, so that the patrol plan generating engine generates a patrol plan according to the set patrol elements. The patrol plan generating engine can set a patrol route for the patrol personnel according to the information of the age, sex, duty time and the like of the patrol personnel, and the patrol time of the patrol and card punching is carried out at the patrol points by a combined authentication mode of each patrol point on the patrol route to obtain the patrol plan.
And the plan sending module 502 is configured to send the patrol plan to a terminal of the patrol personnel, so that the patrol personnel uses the authentication factor specified by the combined authentication mode to perform patrol and card punching on the patrol point according to the patrol route in the patrol time. The module generates a patrol plan for the patrol personnel and sends the patrol plan to the terminal of the patrol personnel.
After receiving the patrol plan, the patrol personnel carry out patrol and card punching through the card punching equipment according to the patrol time, the patrol route and the authentication factors corresponding to the combined authentication modes arranged on each patrol point position specified by the patrol plan. The card punching equipment collects authentication information, generates a patrol card punching request and sends the patrol card punching request to the authentication card punching module.
The authentication and punching module 503 is configured to receive a patrol and punching request from a punching device, perform trusted identity authentication on authentication information corresponding to a patrol point carried by the patrol and punching request, and determine that the patrol personnel completes patrol and punching of the patrol point after the authentication is passed. The patrol and card-punching request comprises a patrol route, a patrol point and authentication information of a patrol person requesting card punching.
The module performs trusted identity authentication on corresponding authentication information according to a combined authentication mode set for the patrol point, and determines that patrol personnel finish patrol and card punching of the patrol point after authentication is passed.
In addition, the patrol device 500 based on trusted identity authentication according to the embodiment of the present invention may further include: a plan generation module and a patrol analysis module (not shown in fig. 5). The scheme generating module is used for calling the patrol plan generating engine so that the patrol plan generating engine generates a corresponding patrol scheme according to the set burst scene; the patrol plan is used for indicating a processing flow for the patrol personnel under the condition that the burst scene occurs.
The patrol analysis module is used for recording the patrol progress of the patrol personnel in real time and the identity authentication record of the patrol personnel on the patrol point of the patrol route; and carrying out patrol analysis according to the patrol progress and the identity authentication record.
It can be seen from the above description that, by making the patrol route of the patrol personnel based on the weather of the patrol time and whether the patrol time belongs to the workday in the patrol plan and the combined authentication mode of each patrol point on the patrol route, when the patrol card-punching request of the patrol personnel is received, the trusted identity authentication is performed on the patrol personnel based on the authentication information corresponding to the combined authentication mode, so that the phenomenon of patrol card-punching can be effectively prevented, and meanwhile, the identity information of the patrol personnel is protected.
Fig. 6 illustrates an exemplary system architecture 600 of a trusted identity authentication-based patrol method or a trusted identity authentication-based patrol device to which embodiments of the present invention may be applied.
As shown in fig. 6, the system architecture 600 may include terminal devices 601, 602, 603, a network 604, and a server 605. The network 604 is used as a medium to provide communication links between the terminal devices 601, 602, 603 and the server 605. The network 604 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
A user may interact with the server 605 via the network 604 using the terminal devices 601, 602, 603 to receive or send messages, etc. Various communication client applications can be installed on the terminal devices 601, 602, 603. The terminal devices 601, 602, 603 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 605 may be a server providing various services, such as a background management server processing a patrol card-punching request transmitted by the user using the terminal devices 601, 602, 603. The background management server can perform processing such as trusted identity authentication on the received patrol card-punching request, and feed back a processing result (such as an authentication result) to the terminal equipment.
It should be noted that, the patrol method based on the trusted identity authentication provided by the embodiment of the present invention is generally executed by the server 605, and accordingly, the patrol device based on the trusted identity authentication is generally set in the server 605.
It should be understood that the number of terminal devices, networks and servers in fig. 6 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
According to embodiments of the present invention, the present invention also provides an electronic device, a computer-readable medium and a computer program product.
The electronic device of the present invention includes: one or more processors; and the storage device is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors are enabled to realize the patrol method based on the trusted identity authentication.
The computer readable medium of the present invention stores a computer program thereon, which when executed by a processor implements a patrol method based on trusted identity authentication of an embodiment of the present invention.
The computer program product comprises a computer program, and the program is executed by a processor to realize the patrol method based on the trusted identity authentication.
Referring now to FIG. 7, there is illustrated a schematic diagram of a computer system 700 suitable for use in implementing an electronic device of an embodiment of the present invention. The terminal device shown in fig. 7 is only an example, and should not impose any limitation on the functions and the scope of use of the embodiment of the present invention.
As shown in fig. 7, the computer system 700 includes a Central Processing Unit (CPU) 701, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data required for the operation of the system 700 are also stored. The CPU 701, ROM 702, and RAM 703 are connected to each other through a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input section 706 including a keyboard, a mouse, and the like; an output portion 707 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 708 including a hard disk or the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. The drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read therefrom is mounted into the storage section 708 as necessary.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 709, and/or installed from the removable medium 711. The above-described functions defined in the system of the present invention are performed when the computer program is executed by a Central Processing Unit (CPU) 701.
The computer readable medium shown in the present invention may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules involved in the embodiments of the present invention may be implemented in software or in hardware. The described modules may also be provided in a processor, for example, as: a processor includes a plan generation module, a plan transmission module, and an authentication card punching module. The names of these modules do not limit the module itself in some cases, for example, the plan generation module may also be described as "a module that calls a patrol plan generation engine to cause the patrol plan generation engine to generate a patrol plan according to a set patrol element".
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be present alone without being fitted into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to include: invoking a patrol plan generating engine to enable the patrol plan generating engine to generate a patrol plan according to the set patrol elements; the patrol elements comprise weather and working days, and the patrol plan is used for indicating patrol personnel to carry out a patrol route, patrol points and corresponding combined authentication modes of patrol and card punching at the patrol time according to the weather of the patrol time and whether the patrol time belongs to the working days; sending the patrol plan to a terminal of the patrol personnel, so that the patrol personnel can carry out patrol and card punching on the patrol points by using the authentication factors specified by the combined authentication mode according to the patrol route in the patrol time; and receiving a patrol and punch card request from the punch card equipment, performing trusted identity authentication on authentication information corresponding to the patrol point carried by the patrol and punch card request, and determining that the patrol personnel completes the patrol and punch card of the patrol point after the authentication is passed.
According to the technical scheme provided by the embodiment of the invention, by making the patrol route of the patrol personnel based on the weather of the patrol time and whether the patrol time belongs to the working day in the patrol plan and the combined authentication mode of each patrol point on the patrol route, when the patrol card-punching request of the patrol personnel is received, the trusted identity authentication is carried out on the patrol personnel based on the authentication information corresponding to the combined authentication mode, so that the phenomenon of the patrol card-punching can be effectively prevented, and the identity information of the patrol personnel is protected.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives can occur depending upon design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (14)

1. The night patrol method based on the trusted identity authentication is characterized by comprising the following steps of:
invoking a patrol plan generating engine to enable the patrol plan generating engine to generate a patrol plan according to the set patrol elements, including: dividing a plurality of patrol points according to the fact that the patrol points belong to an internal office area, an internal non-office area or an external area, so as to obtain a corresponding patrol point set; if the patrol time is determined to be a working day and is a first target weather, planning a patrol route which does not affect office work for a patrol point set belonging to the internal office area, and respectively planning the shortest patrol route for the patrol point sets belonging to the internal non-office area and the external area; if the patrol time is determined to be a working day and is a second target weather, planning the patrol route which does not affect office work for the patrol point set belonging to the internal office area, planning the shortest patrol route for the patrol point set belonging to the internal non-office area, and setting the patrol state of the patrol point set belonging to the external area as a card-punched state; if the patrol time is determined to be a non-working day, respectively planning the shortest patrol route for a plurality of patrol point sets; the patrol elements comprise weather and working days, and the patrol plan is used for indicating patrol personnel to carry out a patrol route, patrol points and corresponding combined authentication modes of patrol and card punching at the patrol time according to the weather of the patrol time and whether the patrol time belongs to the working days;
Sending the patrol plan to a terminal of the patrol personnel, so that the patrol personnel can carry out patrol and card punching on the patrol points by using the authentication factors specified by the combined authentication mode according to the patrol route in the patrol time;
and receiving a patrol and punch card request from the punch card equipment, performing trusted identity authentication on authentication information corresponding to the patrol point carried by the patrol and punch card request, and determining that the patrol personnel completes the patrol and punch card of the patrol point after the authentication is passed.
2. The method of claim 1, wherein the patrol element further comprises: the patrol personnel, the patrol route, the patrol time, the patrol point and the combination authentication mode corresponding to the patrol point;
generating a patrol plan according to the set patrol elements comprises the following steps:
setting the patrol time for the patrol personnel to carry out patrol and card punching at the patrol point;
and setting a patrol route for the patrol personnel and a combination authentication mode of patrol points on the patrol route according to the weather of the patrol time and whether the patrol time belongs to a working day.
3. The method of claim 1, wherein the performing trusted identity authentication on authentication information corresponding to a patrol point carried by the patrol card-punching request includes:
invoking a trusted identity authentication interface to perform trusted identity authentication on authentication information corresponding to a patrol point carried by the patrol card punching request;
in the trusted identity authentication process, one or more modes of living body detection technology, encryption technology, IP address and physical address control are used for preventing attacks.
4. The method according to claim 1, wherein the method further comprises:
calling the patrol plan generating engine to enable the patrol plan generating engine to generate a corresponding patrol plan according to the set burst scene; the patrol plan is used for indicating a processing flow for the patrol personnel under the condition that the burst scene occurs.
5. The method according to claim 1, wherein the method further comprises:
recording the patrol progress of the patrol personnel in real time and recording the identity authentication record of the patrol personnel on the patrol points of the patrol route;
and carrying out patrol analysis according to the patrol progress and the identity authentication record.
6. The method according to any one of claims 1 to 5, wherein the combined authentication means is a combination of any one or more of the following authentication factors: biological information, dynamic two-dimensional codes, trusted identity passwords and dynamic verification codes.
7. Patrol device based on trusted identity authentication, which is characterized by comprising:
the plan generating module is used for calling a patrol plan generating engine so that the patrol plan generating engine generates a patrol plan according to the set patrol elements, and comprises the following steps: dividing a plurality of patrol points according to the fact that the patrol points belong to an internal office area, an internal non-office area or an external area, so as to obtain a corresponding patrol point set; if the patrol time is determined to be a working day and is a first target weather, planning a patrol route which does not affect office work for a patrol point set belonging to the internal office area, and respectively planning the shortest patrol route for the patrol point sets belonging to the internal non-office area and the external area; if the patrol time is determined to be a working day and is a second target weather, planning the patrol route which does not affect office work for the patrol point set belonging to the internal office area, planning the shortest patrol route for the patrol point set belonging to the internal non-office area, and setting the patrol state of the patrol point set belonging to the external area as a card-punched state; if the patrol time is determined to be a non-working day, respectively planning the shortest patrol route for a plurality of patrol point sets; the patrol elements comprise weather and working days, and the patrol plan is used for indicating patrol personnel to carry out a patrol route, patrol points and corresponding combined authentication modes of patrol and card punching at the patrol time according to the weather of the patrol time and whether the patrol time belongs to the working days;
The plan sending module is used for sending the patrol plan to the terminal of the patrol personnel so that the patrol personnel can carry out patrol and card punching on the patrol points by using the authentication factors appointed by the combined authentication mode according to the patrol route in the patrol time;
the authentication card punching module is used for receiving a patrol card punching request from card punching equipment, carrying out trusted identity authentication on authentication information corresponding to a patrol point carried by the patrol card punching request, and determining that patrol personnel finish patrol card punching of the patrol point after the authentication is passed.
8. The apparatus of claim 7, wherein the patrol element further comprises: the patrol personnel, the patrol route, the patrol time, the patrol point and the combination authentication mode corresponding to the patrol point;
the plan generating module is also used for setting the patrol time for the patrol personnel to carry out patrol and card punching at the patrol point; and
and setting a patrol route for the patrol personnel and a combination authentication mode of patrol points on the patrol route according to the weather of the patrol time and whether the patrol time belongs to a working day.
9. The apparatus of claim 7, wherein the authentication card punching module is further configured to
Invoking a trusted identity authentication interface to perform trusted identity authentication on authentication information corresponding to a patrol point carried by the patrol card punching request;
in the trusted identity authentication process, one or more modes of living body detection technology, encryption technology, IP address and physical address control are used for preventing attacks.
10. The apparatus of claim 7, wherein the apparatus further comprises:
the plan generation module is used for calling the patrol plan generation engine so that the patrol plan generation engine generates a corresponding patrol plan according to the set burst scene; the patrol plan is used for indicating a processing flow for the patrol personnel under the condition that the burst scene occurs.
11. The apparatus of claim 7, wherein the apparatus further comprises:
the patrol analysis module is used for recording the patrol progress of the patrol personnel in real time and the identity authentication record of the patrol personnel on the patrol point of the patrol route;
and carrying out patrol analysis according to the patrol progress and the identity authentication record.
12. The apparatus according to any one of claims 7 to 11, wherein the combined authentication means is a combination of one or more of the following authentication factors: biological information, dynamic two-dimensional codes, trusted identity passwords and dynamic verification codes.
13. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs,
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-6.
14. A computer readable medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any of claims 1-6.
CN202111615906.0A 2021-12-27 2021-12-27 Night patrol method, night patrol device, electronic equipment and computer readable medium Active CN114333098B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111615906.0A CN114333098B (en) 2021-12-27 2021-12-27 Night patrol method, night patrol device, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111615906.0A CN114333098B (en) 2021-12-27 2021-12-27 Night patrol method, night patrol device, electronic equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN114333098A CN114333098A (en) 2022-04-12
CN114333098B true CN114333098B (en) 2024-03-08

Family

ID=81012348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111615906.0A Active CN114333098B (en) 2021-12-27 2021-12-27 Night patrol method, night patrol device, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN114333098B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008134715A (en) * 2006-11-27 2008-06-12 Hitachi Ltd Information processing system and information processing method
CN105606109A (en) * 2014-09-04 2016-05-25 威斯通全球技术公司 Determining a route based on a preference
JP2017045321A (en) * 2015-08-27 2017-03-02 前田建設工業株式会社 Information management system, information management method, and information management program
CN107613460A (en) * 2017-09-27 2018-01-19 邓方舟 The control method and device of a kind of distance
KR20200048929A (en) * 2018-10-31 2020-05-08 삼성에스디에스 주식회사 Apparatus and method for patrol management
CN112016735A (en) * 2020-07-17 2020-12-01 厦门大学 Patrol route planning method and system based on traffic violation hotspot prediction and readable storage medium
CN112270375A (en) * 2020-11-10 2021-01-26 中煤航测遥感集团有限公司 Method, device and equipment for determining accompanying track and storage medium
CN112734973A (en) * 2020-12-24 2021-04-30 深圳市兴海物联科技有限公司 Point location patrol method and point location patrol system
CN112767216A (en) * 2021-01-22 2021-05-07 上海高诚智能科技有限公司 Flood prevention facility inspection management system and method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003242202A (en) * 2002-02-14 2003-08-29 Fujitsu Ltd Construction site safety management method, program and device
US7610151B2 (en) * 2006-06-27 2009-10-27 Microsoft Corporation Collaborative route planning for generating personalized and context-sensitive routing recommendations
WO2017062684A1 (en) * 2015-10-06 2017-04-13 Numerica Corporation Systems and methods for dynamically generating patrol schedules based on historic demand event data

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008134715A (en) * 2006-11-27 2008-06-12 Hitachi Ltd Information processing system and information processing method
CN105606109A (en) * 2014-09-04 2016-05-25 威斯通全球技术公司 Determining a route based on a preference
JP2017045321A (en) * 2015-08-27 2017-03-02 前田建設工業株式会社 Information management system, information management method, and information management program
CN107613460A (en) * 2017-09-27 2018-01-19 邓方舟 The control method and device of a kind of distance
KR20200048929A (en) * 2018-10-31 2020-05-08 삼성에스디에스 주식회사 Apparatus and method for patrol management
CN112016735A (en) * 2020-07-17 2020-12-01 厦门大学 Patrol route planning method and system based on traffic violation hotspot prediction and readable storage medium
CN112270375A (en) * 2020-11-10 2021-01-26 中煤航测遥感集团有限公司 Method, device and equipment for determining accompanying track and storage medium
CN112734973A (en) * 2020-12-24 2021-04-30 深圳市兴海物联科技有限公司 Point location patrol method and point location patrol system
CN112767216A (en) * 2021-01-22 2021-05-07 上海高诚智能科技有限公司 Flood prevention facility inspection management system and method

Also Published As

Publication number Publication date
CN114333098A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
US20180182179A1 (en) Comprehensive system and method for real-time monitoring and management of security patrolling operations
CN111612168B (en) Management method and related device for machine learning task
CA2799170C (en) System and method for monitoring an area using nfc tags
US20150302362A1 (en) Time tracking device and method
WO2020155839A1 (en) Blockchain-based method and device for performing scene-based deposition on face information
EP3249570A1 (en) Method and device for providing prompt indicating loss of terminal
CN111915789A (en) Visitor reservation management method, device, equipment and storage medium
CN110069911A (en) Access control method, device, system, electronic equipment and readable storage medium storing program for executing
CN103841283A (en) Rapid police-sending security system
CN110414208A (en) Login validation method, calculates equipment and medium at device
CN108123961A (en) Information processing method, apparatus and system
US11763547B2 (en) Monitoring devices at enterprise locations using machine-learning models to protect enterprise-managed information and resources
US20160110531A1 (en) Information processing apparatus, terminal apparatus and information processing method
CN108470131A (en) Method and apparatus for generating prompt message
US11271924B1 (en) Image capture to enforce remote agent adherence
CN114333098B (en) Night patrol method, night patrol device, electronic equipment and computer readable medium
KR20210145631A (en) Method and apparatus for providing control information for integrally managing closed-circuit television
CN103390143B (en) Display control method, device and the display device including the device
CN113506090B (en) Audit data processing method and device, storage medium and electronic equipment
CN110866292A (en) Interface display method and device, terminal equipment and server
CN114663089A (en) Data processing method and device, electronic equipment and storage medium
CN113988867A (en) Fraud detection method and device, computer equipment and storage medium
CN112702566A (en) Power line patrol unmanned aerial vehicle communication system and method
JPWO2019098205A1 (en) Authentication device, authentication method, and program
CN113341856B (en) Security monitoring system, security monitoring method and security monitoring equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant